Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
A Hybrid Mechanism of Coordinate Matching
Based on Multi-Keyword Ranked Search
Algorithm Over Encrypted Cloud Data
Vineet P. Badadali Mrs. Shimi Jeyaseelan M.Tech, Computer Network Engineering Assistant Professor, Dept of CSE
T.John Institute of Technology T.John Institute of Technology
Bangalore, India Bangalore, India
Abstract— Cloud Computing represents one of the most
significant shifts in information technology many of us are likely
to see in our lifetimes. With the advent of cloud computing, it
enables the cloud customers and data owners to remotely store
their sensitive data into the centralized cloud, so as to enjoy the
on-demand high quality applications and services from a pool of
computing resources. But the sensitive data has to be encrypted
before outsourcing, in order to protect from data privacy which
makes effective data utilization a very challenging task. Thus, the
keyword searchable encryption enables a user to selectively
search his data without leaking information over encrypted data.
For the large number of documents and data users in the cloud,
it is necessary to allow multi-keyword search to meet efficient
computation and communication requirements. We define a
mechanism for privacy-preserving multi-keyword ranked search
over encrypted cloud data, which uses an efficient principle of
‘coordinate matching by inner product similarity’ which can
match many keywords, to capture the similarity between search
query and data documents. Firstly, an MRSE scheme using
secure inner product computation is proposed. The second
module delivers to meet privacy requirements in two levels of
threat models: Known Ciphertext model and Known
Background Model. The MRSE scheme out performs and
analyses the most efficient proposals in terms of time complexity
while satisfying low computation and communication overhead.
Keywords— Privacy-preserving Search; Multi-keyword Search;
Coordinate matching; Encrypted Cloud computing.
I. INTRODUCTION
Cloud computing is the long dreamed vision of computing
as a utility, where cloud customers can remotely store their
data into the cloud so as to enjoy the on-demand high quality
applications and services from a shared pool of configurable
computing resources [1]. Its great flexibility and economic
savings are motivating both individuals and enterprises to
outsource their local complex data management system into
the cloud, especially when the data produced by them that
need to be stored and utilized is rapidly increasing. To protect
data privacy and combat unsolicited accesses in cloud and
beyond, sensitive data, e.g., emails, personal health records,
photo albums, tax documents, financial transactions, etc., may
have to be encrypted by data owners before outsourcing to
commercial public cloud [2]; this, however, obsoletes the
traditional data utilization service based on plaintext keyword
search. The trivial solution of downloading all the data and
decrypting locally is clearly impractical, due to the huge
amount of bandwidth cost in cloud scale systems. Moreover,
aside from eliminating the local storage management, storing
data into the cloud serves no purpose unless they can be easily
searched and utilized. Thus, exploring privacy-preserving and
effective search service over encrypted cloud data is of
paramount importance. Considering the potentially large
number of on demand data users and huge amount of
outsourced data documents in cloud, this problem is
particularly challenging as it is extremely difficult to meet also
the requirements of performance, system usability and
scalability.
On the one hand, to meet the effective data retrieval need,
large amount of documents demand cloud server to perform
result relevance ranking, instead of returning undifferentiated
result. Such ranked search system enables data users to find
the most relevant information quickly, rather than
burdensomely sorting through every match in the content
collection [3]. Ranked search can also elegantly eliminate
unnecessary network traffic by sending back only the most
relevant data, which is highly desirable in the “pay-as-youuse”
cloud paradigm. For privacy protection, such ranking
operation, however, should not leak any keyword related
information. On the other hand, to improve search result
accuracy as well as enhance user searching experience, it is
also crucial for such ranking system to support multiple
keywords search, as single keyword search often yields far too
coarse result. As a common practice indicated by today’s web
search engines (e.g., Google search), data users may tend to
provide a set of keywords instead of only one as the indicator
of their search interest to retrieve the most relevant data. And
each keyword in the search request is able to help narrow
down the search result further. “Coordinate matching” [4], i.e.,
as many matches as possible, is an efficient principle among
such multi-keyword semantics to refine the result relevance,
and has been widely used in the plaintext information retrieval
( IR ) community. However, how to apply it in the encrypted
cloud data search system remains a very challenging task
because of inherent security and privacy obstacles, including
various strict requirements like data privacy, index privacy,
keyword privacy, and many others (see section III-B).
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Published by, www.ijert.org
ICESMART-2015 Conference Proceedings
Volume 3, Issue 19
Special Issue - 2015
1
In the literature, searchable encryption [5]–[13] is a helpful
technique that treats encrypted data as documents and allows a
user to securely search over it through single keyword and
retrieve documents of interest. However, direct application of
these approaches to deploy secure large scale cloud data
utilization system would not be necessarily suitable, as they
are developed as crypto primitives and cannot accommodate
such high service-level requirements like system usability,
user searching experience, and easy information discovery in
mind.
Although some recent designs have been proposed to support
Boolean keyword search [14]–[21] as an attempt to enrich the
search flexibility, they are still not adequate to provide users
with acceptable result ranking functionality (see section VI).
Our early work [22] has been aware of this problem, and
solves the secure ranked search over encrypted data with
support of only single keyword query. But how to design an
efficient encrypted data search mechanism that supports multi-
keyword semantics without privacy breaches still remains an
challenging open problem.
In this paper, for the first time, we define and solve the
problem of multi-keyword ranked search over encrypted cloud
data (MRSE) while preserving strict system-wise privacy in
cloud computing paradigm. Among various multi-keyword
semantics, we choose the efficient principle of “coordinate
matching”, i.e., as many matches as possible, to capture the
similarity between search query and data documents.
Specifically, we use “inner product similarity” [4], i.e., the
number of query keywords appearing in a document, to
quantitatively evaluate the similarity of that document to the
search query in “coordinate matching” principle. During index
construction, each document is associated with a binary vector
as a subindex where each bit represents whether corresponding
keyword is contained in the document. The search query is
also described as a binary vector where each bit means
whether corresponding keyword appears in this search request,
so the similarity could be exactly measured by inner product
of query vector with data vector. However, directly
outsourcing data vector or query vector will violate index
privacy or search privacy. To meet the challenge of supporting
such multi-keyword semantic without privacy breaches, we
propose a basic MRSE scheme using secure inner product
computation, which is adapted from a secure k-nearest
neighbor (kNN) technique [4], and then improve it step by step
to achieve various privacy requirements in two levels of threat
models. Our contributions are summarized as follows,
1) For the first time, we explore the problem of multi-
keyword ranked search over encrypted cloud data, and
establish a set of strict privacy requirements for such a
secure cloud data utilization system to become a reality.
2) We propose two MRSE schemes following the principle
of “coordinate matching” while meeting different
privacy requirements in two levels of threat models.
3) Thorough analysis investigating privacy and efficiency
guarantees of proposed schemes is given, and
experiments on the real-world dataset further show
proposed schemes indeed introduce low overhead on
computation and communication.
The remainder of this paper is organized as follows. In
Section II, we introduce the system and threat model, our
design goals, and preliminary. Section III describes MRSE
framework and privacy requirements, followed by section IV,
which gives our schemes achieving efficiency and privacy
requirements. Section V presents simulation results. We
discuss related work on both single and Boolean keyword
searchable encryption in Section VI, and conclude the paper in
Section VII.
II. PROBLEM FORMULATION
A. System Model
Considering a cloud data hosting service involving three
different entities, as illustrated in Fig. 1: data owner, data
user, and cloud server. Data owner has a collection of data
documents F to be outsourced to cloud server in the encrypted
form C. To enable the searching capability over C for
effective data utilization, data owner, before outsourcing, will
first build an encrypted searchable index I from F, and then
outsource both the index I and the encrypted document
collection C to cloud server. To search the document
collection for t given keywords, an authorized user acquires a
corresponding trapdoor T through search control mechanisms,
e.g., broadcast encryption [8]. Upon receiving T from data
users, cloud server is responsible to search the index I and
return the corresponding set of encrypted documents. To
improve document retrieval accuracy, search result should be
ranked by cloud server according to some ranking criteria
(e.g., coordinate matching, as will be introduced shortly).
Moreover, to reduce communication cost, data user may send
an optional number k along with the trapdoor T so that cloud
server only sends back top-k documents that are most relevant
to the search query. Finally, the access control mechanism is
employed to manage decryption capabilities given to users.
B. Threat Model
Cloud server is considered as “honest-but-curious” in our
model, which is consistent with the most related works on
searchable encryption. Specifically, cloud server acts in an
“honest” fashion and correctly follows the designated
protocol specification. However, it is “curious” to infer and
analyze data (including index) in its storage and message
flows received during the protocol so as to learn additional
information. Based on what information cloud server knows,
we consider two levels of threat models as follows.
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Published by, www.ijert.org
ICESMART-2015 Conference Proceedings
Volume 3, Issue 19
Special Issue - 2015
2
Known Ciphertext Model: In this model, cloud server is
supposed to only know encrypted dataset C and searchable
index I, both of which are outsourced from data owner.
Known Background Model: In this stronger model, cloud
server is supposed to possess some backgrounds on the
dataset, such as the subject and its related statistical
information, in addition to what can be accessed in known
ciphertext model. As an instance of possible attacks in this
case, cloud server could utilize document frequency or
keyword frequency [23] to identify keywords in the query.
C. Design Goals
To enable ranked search for effective utilization of
outsourced cloud data under the aforementioned model, our
system design should simultaneously achieve security and
performance guarantees as follows.
• Multi-keyword Ranked Search: To design search
schemes which allow multi-keyword query and provide
result similarity ranking for effective data retrieval,
instead of returning undifferentiated results.
• Privacy-Preserving: To prevent cloud server from
learning additional information from dataset and index,
and to meet privacy requirements specified in section III-
B.
• Efficiency: Above goals on functionality and privacy
should be achieved with low communication and
computation overhead.
D. Notations
• F – the plaintext document collection, denoted as a set of
m data documents F = (F1,F2,...,Fm).
• C – the encrypted document collection stored in cloud
server, denoted as C = (C1,C2,...,Cm).
• W – the distinct keywords extracted from document
collection F, denoted as W = (W1,W2,...,Wn).
• I – the searchable index associated with C, denoted as
(I1,I2,...,Im) where each subindex Ii is built for Fi.
• Wf – the subset of W, representing the keywords in a
search request, denoted as Wf = (Wj1, Wj2,...,Wjt).
• TW – the trapdoor for the search request Wf.
• FW – the ranked id list of all documents according to their
similarity with Wf.
E. Preliminary on Coordinate Matching
As a hybrid of conjunctive search and disjunctive search,
“coordinate matching” [4] is an intermediate approach which
uses the number of query keywords appearing in the document
to quantify the similarity of that document to the query. When
users know the exact subset of the dataset to be retrieved,
Boolean queries perform well with the precise search
requirement specified by the user. Therefore, it is more
flexible for users to specify a list of keywords indicating their
interest and retrieve the most relevant documents with rank
order.
III. FRAMEWORK AND PRIVACY
REQUIREMENTS FOR MRSE
In this section, we define the framework of multi-
keyword ranked search over encrypted cloud data (MRSE)
and establish various strict system-wise privacy requirements
for such a secure cloud data utilization system.
A. MRSE Framework
For easy presentation, operations on the data documents are
not shown in the framework since data owner could easily
employ traditional symmetric key cryptography to encrypt and
then outsource data. With focus on index and query, a MRSE
consists of four algorithms as follows.
• Setup(1l) Taking a security parameter l as input, data
owner outputs a symmetric key as SK.
• BuildIndex(F,SK) Based on the dataset F, data owner
builds a searchable index I which is encrypted by the
symmetric key SK and then outsourced to cloud server.
After the index construction, the document collection can
be independently encrypted and outsourced.
• Trapdoor(Wf) With t keywords of interest in Wf as input,
this algorithm generates a corresponding trapdoor TWe.
• Query(We,k,I) When cloud server receives a query T
request as (TW, k), it performs the ranked search on the
index I with the help of trapdoor TW, and finally returns
FW, the ranked id list of top-k documents sorted by their
similarity with Wf.
Both search control and access control are not within the
scope of this paper. While the former is to regulate how
authorized users acquire trapdoors, the later is to manage
users’ access to outsourced documents.
B. Privacy Requirements for MRSE
The representative privacy guarantee in the related
literature, such as searchable encryption, is that the server
should learn nothing but search results. With this general
privacy description, we explore and establish a set of strict
privacy requirements specifically for the MRSE framework.
As for the data privacy, data owner can resort to traditional
symmetric key cryptography to encrypt the data before
outsourcing, and successfully prevent cloud server from
prying into outsourced data. With respect to the index privacy,
if server deduces any association between keywords and
encrypted documents from index, it may learn the major
subject of a document, even the content of a short document
[23].
Therefore, searchable index should be constructed to
prevent server from performing such kind of association
attack. While data and index privacy guarantees are demanded
by default in the related literature, various search privacy
requirements involved in the query procedure are more
complex and difficult to tackle as follows.
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Published by, www.ijert.org
ICESMART-2015 Conference Proceedings
Volume 3, Issue 19
Special Issue - 2015
3
Keyword Privacy As users usually prefer to keep their search
from being exposed to others like cloud server, the most
important concern is to hide what they are searching, i.e., the
keywords indicated by the corresponding trapdoor. Although
the trapdoor can be generated in a cryptographic way to
protect the query keywords, cloud server could do some
statistical analysis over the search result to make an estimate.
As a kind of statistical information, document frequency (i.e.,
the number of documents containing the keyword) is sufficient
to identify the keyword with high probability [24]. When
cloud server knows some background information of the
dataset, this keyword specific information may be utilized to
reverse engineer the keyword.
Trapdoor Privacy Since only authorized users are allowed to
acquire trapdoors for their search query, the server is not
expected to have the ability to generate valid trapdoors from
previous received ones. Specifically, given one trapdoor for a
set of multiple keywords, the server is not allowed to generate
a valid trapdoor for its subset, including single keyword. For
example, it is forbidden to generate or deduce a new trapdoor
as TWi for keyword Wi from the received trapdoor as T(Wi,Wk) for
two keywords (Wi,Wj). Moreover, the server is not allowed to
generate a valid trapdoor, e.g., T(Wi,Wj), from two or more
trapdoors, like T(Wi,Wk) and T(Wj,Wk).
Search Pattern In accordance with the definition in related
work on single keyword searchable encryption [8], search
pattern of data user in MRSE means any information that can
be derived by server if it acquires the knowledge that two
arbitrary searches are performed for the same keywords or not.
If the trapdoor is generated in a deterministic manner, server
could easily know the search pattern of any data user by
comparing trapdoors received from that user. So the
fundamental protection for search pattern is to introduce non
determinacy into trapdoor generation procedure.
Access Pattern Within the ranked search, access pattern is the
sequence of search results where every search result is a set of
documents with rank order. Specifically, the search result for
Wf is denoted as FW, consisting of the id list of all documents
ranked by their similarity to Wf. Then the access pattern is
denoted as (FW1, FW2,...) which are the results of sequential
searches. Although a few searchable encryption works, e.g.,
[17] has been proposed to utilize private information retrieval
(PIR) technique [25], to hide access pattern, our proposed
schemes are not designed to protect access pattern for the
efficiency concerns. This is because any PIR based technique
must “touch” the whole dataset outsourced on the server
which is inefficient in the large scale cloud system.
IV. PRIVACY-PRESERVING AND EFFICIENT MRSE
To efficiently achieve multi-keyword ranked search, we
propose to employ “inner product similarity” [4] to
quantitatively formalize the efficient ranking principle
“coordinate matching”. Specifically, Di is a binary data vector
for document Fi where each bit Di[j] ∈ {0,1} represents the
existence of the corresponding keyword Wj in that document,
and Q is a binary query vector indicating the keywords of
interest where each bit Q[j] ∈{0,1} represents the existence of
the corresponding keyword Wj in the query Wf. The similarity
score of document Fi to query Wf is therefore expressed as the
inner product of their binary column vectors, i.e., Di · Q. For
the purpose of ranking, cloud server must be given the
capability to compare the similarity of different documents to
the query. But, to preserve strict system-wise privacy, data
vector Di, query vector Q and their inner product Di·Q should
not be exposed to cloud server. In this section, we first
propose a basic MRSE scheme using secure inner product
computation, which is adapted from a secure k-nearest
neighbor (kNN) technique, and then show how to significantly
improve it to be privacy-preserving against different levels of
threat models in the MRSE framework in a step-by-step
manner.
A. MRSE I: Basic Scheme
1) Secure kNN Computation: In the secure k-nearest neighbor
(kNN) scheme [26], Euclidean distance between a database
record p i and a query vector q is used to select k nearest
database records. The secret key is composed of one (d+1)bit
vector as S and two (d + 1) × (d + 1) invertible matrices as
{M1,M2}, where d is the number of fields for each record pi.
First, every data vector pi and query vector q are extended to
(d + 1)-dimension vectors as p~i and ~q, where the (d + 1)th
dimension is set to , respectively. Besides, the
query vector ~q is scaled by a random number r > 0 as (rq,r).
Then, p~i is split into two random vectors as , and ~q
is also split into two random vectors as {~q 0,~q 00}. Note here
that vector S functions as a splitting indicator. Namely, if the
j-th bit of S is 0, p~i0[j] and are set as the same as p~i[j],
while ~q 0[j] and ~q 00[j] are set to two random numbers so
that their sum is equal to ~q[j]; if the jth bit of S is 1, the
splitting process is similar except that p~i and ~q are switched.
The split data vector pair is encrypted
as , and the split query vector pair {~q 0,~q 00} is encrypted as . In the query step, the
product of data vector pair and query vector pair, i.e.,
−0.5r(||pi||2−2pi·q), is serving as the indicator of Euclidean
distance (||pi|| 2−2pi·q+||q||2) to select k nearest neighbors.
Without prior knowledge of secret key, neither data vector nor
query vector, after such a series of processes, can be recovered
by analyzing their corresponding ciphertext.
As MRSE is using inner product similarity instead of
Euclidean distance, we need to do some modifications on the
data structure to fit the MRSE framework. By eliminating
dimension extension, the final result changes to be the inner
product as rpi ·q, and it seems that an efficient inner product
computation scheme can be directly achieved. However, this
approach hides the product only by a scale factor r which will
leak the relationship among different queries. For example, if
two queries are taking for the same keywords, denoted as rq
and r0q, similarity scores in two queries will satisfy the scale
relationship, i.e., (pi·rq)/(pi·r 0q) = (pj·rq)/(pj·r0q) = r/r0. As a
consequence, the search pattern of data user is leaked via
examining whether similarity scores for all documents in two
queries hold such relationship.
2) MRSE I Scheme: To provide a guarantee against violation
on search pattern clearly presented above, we have to
eliminate the scale relationship among similarity scores in
different queries. To do so, instead of simply removing the
extended dimension as we plan to do at the first glance, we
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Published by, www.ijert.org
ICESMART-2015 Conference Proceedings
Volume 3, Issue 19
Special Issue - 2015
4
preserve this dimension extending operation but assign a
random number to the extended dimension in each query
vector. The whole scheme to achieve ranked search with
multiple keywords over encrypted data is as follows.
• Setup After extracting the distinct keywords set W from
the document collection F, data owner randomly
generates a (n+1)-bit vector as S and two (n+1)×(n+1)
invertible matrices {M1,M2}. The secret key SK is in the
form of a 3-tuple as {S,M1,M2}.
• BuildIndex(F,SK) Data owner generates a binary data
vector Di for every document Fi, where each binary bit
Di[j] represents the existence of the corresponding
keyword Wj in that document. Subsequently, every
subindex Ii is generated by applying dimension
extending, splitting and encrypting procedures on Di.
These procedures are similar with those above except
that the (n+1)-th entry in D~i is set to 1 during dimension
extending. Finally, subindex
is built for every encrypted document Ci on cloud server.
• Trapdoor(Wf) With t keywords of interest in Wf as input,
one binary vector Q is first generated where each bit Q[j]
indicates whether Wj ∈ Wf is true or false. Q is then
scaled by a random number r =6 0 as rQ, and extended to
a (n+1)-dimension vector as Q~ = (rQ,t) where t is
another random number. After applying the same
splitting and encrypting processes as above, the trapdoor
TWe is generated as .
• Query(TWe,k,I) With the trapdoor TWe, cloud server
computes the similarity scores of each document Fi as in
equation 1. WLOG, we assume r > 0. After sorting all
scores, cloud server returns the top-k ranked id list FWe.
With the randomness t brought into the query vector, the
final similarity scores do not keep the proportional relationship
to the original inner product and therefore prevent cloud server
from guessing search pattern through search results.
3) Analysis: We analyze this basic MRSE scheme from three
aspects of design goals described in section II.
Functionality and Efficiency Assume the number of query
keywords appearing in a document Fi is xi = Di · Q. From
equation 1, the final similarity score as yi = Ii ·TWe = rxi +t is a
linear function of xi. Besides, the coefficient r is set as a
positive random number, so the order of similarity is exactly
preserved for all the outsourced documents. When cloud
server creates the FWe by the final similarity score yi, the top-k
most similar documents to the query are included with the
precise rank order. Similar with the secure kNN scheme, our
inner product based MRSE scheme is an outstanding approach
from the performance perspective. In the step like BuildIndex
or Trapdoor, the generation procedure of each subindex or
trapdoor involves two multiplications of a (n + 1) × (n + 1)
matrix and a (n + 1)-dimension vector. In the Query, the final
similarity score is computed through two multiplications of
two (n + 1)-dimension vectors.
Privacy As for the data privacy, traditional symmetric key
encryption techniques could be properly utilized here and is
not within the scope of this paper. The index privacy is well
protected if the secret key SK is kept confidential since such
vector encryption method has been proved to be secure in
known ciphertext model [26]. In addition to the random
number t in the query result, our basic scheme can generate
two totally different trapdoors for the same query Wf.
Therefore, the search pattern is well protected in our basic
scheme, while it is an unsolved privacy leakage problem in
related symmetric key based searchable encryption schemes
because of the deterministic property of trapdoor generation.
TABLE I: Min/Max Score Analysis I
r > 0 min{yj} = r · min{xi} + t r > 0 submin{yj} = r · submin{xi} + t r < 0 max{yj} = r · max{xi} + t r < 0 submax{yj} = r · submax{xi} + t
B. MRSE II: Privacy-Preserving Scheme in Known
Ciphertext Model
MRSE I scheme performs outstanding from the efficiency
perspective and also provides privacy guarantee on search
pattern, but it will incur trapdoor privacy leakage once cloud
server is requested by users to execute two or more times of
searches. By analyzing similarity scores obtained during
search, cloud server has a chance to deduce a valid trapdoor
which violates trapdoor privacy goal. We first demonstrate
how such analysis attack works, and then show this problem
can be fixed through inserting dummy keyword.
1) Min/Max Score Analysis Attack: With any two valid
trapdoors T1 and T2 submit by users, cloud server may explore
the relationship among similarity scores to deduce a new
trapdoor T3. If T1 and T2 happen to be trapdoors for two related
sets of query keywords, like {K1,K2} and {K1,K2,K3,K4}, T3
then becomes a valid trapdoor for keywords {K3,K4}. To
illustrate, the relationship between final similarity score yj with
the original one xi is listed in Tab. I. WLOG, we only discuss
the case where r > 0. In the query Q1 with the trapdoor T1 =
{T1[1],T1[2]}, there may exist a document containing neither
K1 nor K2 with very high probability. As a result, the minimal
original similarity score as min{xi} is equal to 0 and the
minimal final similarity score as min{yj} becomes t1.
Considering the large number of outsourced documents, it is
very likely that there also exists a document containing only
one of the two keywords, and then the subminimal original
similarity score as submin{xi} is equal to 1 and the
subminimal final similarity score as submin{yj} becomes r1
+t1. With t1 and r1 + t1, cloud server solves r1 with apparent
ease. Similarly, the other two parameters r2 and t2 can be
figured out with T2 = {T2[1],T2[2]} for query Q2. Assume that
the original query vector for {K3,K4} is denoted as Q3. Note
that Q3 is equal to Q2 − Q1 according to the definition of binary
query vector and the relationship between three keyword sets. Then the 2-tuple as {T2[1]/r2 −T1[1]/r1,T2[2]/r2 −T1[2]/r1} can
be utilized by cloud server as a valid trapdoor T3 for query Q3
where r3 is set to 1 and t3 is set to (r2/r2 − t1/r1). The
effectiveness of T3 is validated in equation 2.
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Published by, www.ijert.org
ICESMART-2015 Conference Proceedings
Volume 3, Issue 19
Special Issue - 2015
5
Ii · T3
= I i ·{T2[1]/r2 − T1[1]/r1,T2[2]/r2 − T1[2]/r1}
= (Di · Q2 + t2/r2) − (Di · Q1 + t1/r1)
= r3(Di · Q3) + t3 (2)
Actually, such kind of trapdoor deduction enables cloud server
to perform query that is not requested by any user, and thus
violates search privacy, specifically the trapdoor privacy.
TABLE II: Min/Max Score Analysis II
r > 0 min{yj} = r · min{xi + εi} + t r > 0 submin{yj} = r · submin{xi + εi} + t r < 0 max{yj} = r · max{xi + εi} + t r < 0 submax{yj} = r · submax{xi + εi} + t
2) MRSE II Scheme: The previous analysis attack shows that
the trapdoor privacy problem stems from the deterministic
relationship between the minimal/subminimal (or
maximal/submaximal) final similarity score and two
parameters as r and t. Therefore, breaking the deterministic
relationship is an alternative to protect trapdoor privacy. In
this section, we propose an improved MRSE scheme
preserving trapdoor privacy in the known ciphertext model.
Namely, we will show how to break the deterministic
relationship while maintaining as much efficiency and
accuracy as possible. Introducing some randomness in the
final similarity score is an effective way towards what we
expect here. More specifically, unlike the randomness
involved in the query vector, we insert a dummy keyword into
each data vector and assign a random value to it. All the
vectors are extended to (n + 2)-dimension instead of (n+1),
and each entry in Di is not a binary value anymore for storing
the random variable εi of the dummy keyword in the (n + 2)-th
dimension. Improvement details in MRSE II scheme is shown
as follows.
• Setup Data owner randomly generates a (n+2)-bit vector
as S and two (n + 2) × (n + 2) invertible matrices as
{M1,M2}.
• BuildIndex(F,SK) The (n+2)-th entry in D~i is set to a
random number εi during the dimension extending.
• Trapdoor(Wf) The (n+2)-th entry in Q~ is always set to 1
for any query Q.
• Query(TWe,k,I) The final similarity score computed by
cloud server is equal to r(xi + εi) + ti.
3) Analysis: We follow the same steps as in MRSE I.
Functionality and Efficiency Because the randomness is
introduced as a part of the similarity score, the final search
result on the basis of sorting similarity scores may not be as
accurate as that in MRSE I scheme. For the consideration of
search accuracy, let ε follow a normal distribution N(0,σ2). To
quantitatively evaluate the search accuracy, we set a measure as precision Pk to capture the fraction of returned top-k
documents that are included in the real topk list. Detailed
accuracy evaluation on the real-world dataset will be given in
section VI. Besides, MRSE II scheme takes similar
computation and communication costs as in MRSE I scheme,
except that all the vector multiplication operations are run in
the (n + 2)-dimension instead of (n + 1)-dimension.
Privacy We first take a look at trapdoor privacy, especially
the Min/Max score analysis. Similar with the case discussed
above, we assume that cloud server has two trapdoors T1 and
T2 for query keywords {K1,K2} and {K1,K2,K3,K4}
respectively. To perform Min/Max score analysis, the server
scans the entire index and computes all the final similarity
scores as listed in Tab. II. With the interference of ε, the
adversary cannot explore useful relationship between the
minimal/subminimal final similarity score and two parameters
as r and t, and thus the Min/Max score analysis attack does not
work anymore.
TABLE III: K3 appears in every document
Doc Query for {K1,K2,K3} Query for {K1,K2} 1 x1 = 3,y1 = r(3+ ε1)+ t x0
1 = 2,y01 = r0(2+ ε1)+ t 0
2 x2 = 2,y2 = r(2+ ε2)+ t x02 = 1,y0
2 = r0(1+ ε1)+ t 0 3 x3 = 1,y3 = r(1+ ε3)+ t x03 = 0,y03 = r0(0+ ε3)+ t 0
TABLE IV: K3 does not appear in either document
Doc Query for {K1,K2,K3} Query for {K1,K2} 1 x1 = 2,y1 = r(2+ ε1)+ t x01 = 2,y01 = r0(2+ ε1)+ t 0 2 x2 = 1,y2 = r(1+ ε2)+ t x0
2 = 1,y02 = r0(1+ ε1)+ t 0
3 x3 = 0,y3 = r(0+ ε3)+ t x03 = 0,y03 = r0(0+ ε3)+ t 0
In addition, any single trapdoor itself does not reveal valuable
information, like the positions of 1 in its original query vector
Q, and therefore keyword privacy is well protected. To sum
up, in the known ciphertext model, MRSE II scheme meets all
expected privacy requirements mentioned in section III-B.
C. MRSE III: Privacy-Preserving Scheme in Known
Background Model
When cloud server has known some background
information on the outsourced dataset, keyword privacy
cannot be guaranteed anymore by MRSE II scheme. This is
possible in known background model because cloud server can
use scale analysis as follows to deduce the keyword-specific
information, e.g., document frequency, which can be further
combined with background information to identify the
keyword in a query at high probability. After presenting how
cloud server uses scale analysis attack to break keyword
privacy, we propose a more advanced MRSE scheme to be
privacy preserving in known background model.
1) Scale Analysis Attack: Given two correlated trapdoors T1
and T2 for query keywords {K1,K2} and {K1,K2,K3}
respectively, there will be two special cases when searching on
any three documents as listed in Tab. III and Tab. IV. In any
of these two cases, there exists a system of equations among
those similarity scores as follows,
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Published by, www.ijert.org
ICESMART-2015 Conference Proceedings
Volume 3, Issue 19
Special Issue - 2015
6
r(1 + ε1 − ε2);
r0(1 + ε1 − ε2) ;
r(2 + ε1 − ε2);
r0(2 + ε1 − ε2).
(3)
And cloud server could deduce the following scale
relationship among all the six scores being consistent with
equation 3 ,
(y1 − y2)/(y01 − y0
2) = (y1 − y3)/(y01 − y0
3). (4)
To this end, although the exact value of xi is encrypted as yi,
cloud server, based on the equivalence of (y1−y2)/(y01−y0
2) and
(y1 − y3)/(y01 − y0
3), could deduce that whether all the three
documents contain K3 or none of them contain K3. By
extending three documents to the whole dataset, cloud server
could deduce two possible values of document frequency of
the keyword K3. In known background model, the server can
further identify the keyword K3 by referring to the keyword
specific document frequency information about the dataset.
(a) (b)
Fig. 2: With different choice of standard deviation σ for the random variable ε,
there exists tradeoff between (a) Precision, and (b) Rank Privacy.
2) MRSE III Scheme: The privacy leakage shown above is
caused by the fixed value of random variable εi in data vector
Di. To eliminate such fixed property in any specific document,
more dummy keywords instead of only one should be inserted
into every data vector Pi. All the vectors are extended to (n+ U
+ 1)-dimension instead of (n + 2), where U is the number of
dummy keywords inserted. Improved details in MRSE III
scheme is presented as follows.
• Setup(1n) Data owner randomly generates a (n+U+1)bit
vector as S and two (n+U+1)×(n+U+1) invertible
matrices {M1,M2}.
• BuildIndex(F,SK) The (n+j+1)-th entry in D~i where j ∈
[1,U] is set to a random number ε(j) during the dimension
extending.
• Trapdoor(Wf) By randomly selecting V out of U dummy
keywords, the corresponding entries in Q are set to 1.
• Query(TW,k,I) The final similarity score computed by
cloud server is equal to where the v-
th dummy keyword is included in the V selected ones.
3) Analysis: To achieve the 80-bit security level, there should
be at least 280 different values of for each data vector.
The number of different is equal to (UV ), which is
maximized when UV = 2. Besides, considering (U
V ) ≥ (VU )V , it
is greater than 280 when U = 160 and V = 80. So every data
vector should include 160 dummy elements, and every query
vector will randomly select 80 dummy elements. To this end,
MRSE III scheme is secure against scale analysis attack, and
provides various expected privacy guarantees within known
ciphertext model or known background model.
Moreover, to make follow the Normal distribution
N(0,σ2) as above, every ε(j) is assumed to follow the same
uniform distribution M(−c,c), where the mean as µj is 0 and the
variance as σj2 is c2/3. According to the central limit theorem,
the sum of 80 independent random variables ε(j) follows the
Normal distribution, where µ = 80µj=0 and σ2 =80σj2 = 80c2/3.
Therefore, the value of c is set as . With such parameter
setting, search accuracy is statistically the same as that in
MRSE II scheme.
(a) ( b )
Fig. 3: Relationship between number of documents in dataset and (a) Number
of distinct keywords in dataset, and (b) Time cost for building searchable index.
V. PERFORMANCE ANALYSIS
In this section, we demonstrate a thorough experimental
evaluation of the proposed technique on a real-world dataset:
the Enron Email Dataset [27]. We randomly select different
number of emails to build dataset. The whole experiment
system is implemented by C language on a Linux Server with
Intel Xeon Processor 2.93GHz. The public utility routines by
Numerical Recipes are employed to compute the inverse of
matrix. The performance of our technique is evaluated
regarding the efficiency of three proposed MRSE schemes, as
well as the tradeoff between search precision and privacy.
A. Precision and Privacy
As presented in Section IV, dummy keywords are inserted
into each data vector and some of them are selected in every
query. Therefore, similarity scores of documents will be not
exactly accurate. In other words, when cloud server returns
top-k documents based on similarity scores of data vectors to
query vector, some of real top-k relevant documents for the
query may be excluded. This is because either their original
similarity scores are decreased or the similarity scores of some
documents out of the real top-k are increased, both of which
are due to the impact of dummy keywords inserted into data
vectors. To evaluate the purity of the k documents retrieved by
user, we define a measure as precision Pk = k 0/k where k0 is
number of real top-k documents that are returned by cloud
server. Fig. 2(a) shows that the precision in MRSE III scheme
is evidently affected by the standard deviation σ of the random
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Published by, www.ijert.org
ICESMART-2015 Conference Proceedings
Volume 3, Issue 19
Special Issue - 2015
7
variable ε. From the consideration of effectiveness, standard
deviation σ is expected to be smaller so as to obtain high
precision indicating the good purity of retrieved documents.
However, user privacy may have been partially leaked to
cloud server as a consequence of small σ. As described in
section III-B, access pattern is defined as the sequence of
ranked search results. Although search results cannot be
protected (excluding costly PIR technique), we can still hide
the rank order of retrieved documents as much as possible. In
order to evaluate this privacy guarantee, we first define the
rank perturbation as pei = |ri −r0i|, where ri is the rank number
of document i in the retrieved top-k documents and r0i is its
rank number in the real top-i ranked documents.
(a) (b)
Fig. 4: Time cost of generating trapdoor. (a) For the same number
(10) of keywords in a query within different number of documents in
dataset. (b) For different number of keywords in a query within same
number (500) of documents in dataset.
The overall rank privacy measure at point k is then defined as
the average of all the pi for every document I in the retrieved
top-k documents. Fig. 2(b) shows the rank privacy at different
points with two standard deviations σ = 1 and σ = 0.5
respectively.
From these two figures, we can see that small σ leads to
higher precision of search result but lower rank privacy
guarantee, while large σ results in higher rank privacy
guarantee but lower precision. In other words, our scheme
provides a balance parameter for data users to satisfy their
different requirements on precision and rank privacy.
B. Efficiency
1) Index Construction: To build a searchable index I from
dataset F, the first step is to map the keyword set extracted
from each document Fi to a data vector Di, followed by
encrypting every data vector. The time cost of mapping or
encrypting depends directly on the dimensionality of data
vector which is determined by the number of distinct
keywords in the dataset. Fig. 3(a) shows that the number of
documents in dataset determines the number of distinct
keywords. Note that a list of standard IR techniques can be used to significantly reduce the number of distinct keywords,
such as case folding, stemming, and stop words. We omit this
refining process and refer readers to [4] for more details. Fig.
3(b) shows that the computation cost of building index is
almost linear with the number of documents in dataset. The
index construction computation cost in MRSE I scheme is
very similar with that in MRSE II scheme since the
dimensionality in MRSE II is just one more than that in the
former scheme. The number of dummy keywords in MRSE III
scheme becomes 160 so that the index construction time is
slight larger than the other two schemes. Although the time of
building index is not a negligible overhead for data owner, this
is a one-time operation before data outsourcing. Besides, Tab.
V lists the storage overhead of subindex in MRSE III scheme
within different number of documents in dataset. The subindex
size is absolutely linear with the dimensionality of data vector,
but its increasing speed slows down in coincidence with that
of the number of distinct keywords. The subindex size in the
other two MRSE schemes is close to that in MRSE III scheme
because of trivial differences in dimensionality of data vector.
(a) ( b )
Fig. 5: Time cost of query. (a) For the same number (10) of keywords in a
query within different number of documents in dataset. (b) For different
number of keywords in a query within the same number (500) of documents in dataset.
TABLE V: Storage overhead of subindex
# of documents in dataset 1000 2000 3000 4000 5000 Size of subindex (KB) 101.4 131.8 166.6 203.8 228.9
2) Trapdoor Generation: Fig. 4(a) shows that the time to
generate a trapdoor is greatly affected by the number of
documents in dataset. Like index construction, every trapdoor
generation incurs two multiplications of a matrix and a split
query vector, where the dimensionality of matrix or query
vector is different in three proposed schemes and becomes
larger with the increasing number of documents in dataset.
Fig. 4(b) demonstrates the trapdoor generation cost in MRSE
III scheme is about 3 percentages larger than that in the other
two schemes, which is majorally brought by the larger
dimensionality. More importantly, it shows that the number of
keywords in a query have little influence on the overhead of
trapdoor generation, which is a significant advantage over
related works on multi-keyword searchable encryption.
3) Query: Query execution in cloud server consists of
computing and ranking similarity scores for all documents in
the dataset. Fig. 5 shows the query time is dominated by the number of documents in dataset, and the number of keywords
in the query has very slight impact on it like the trapdoor
generation above. With respect to the communication cost in
Query, the size of trapdoor is the same as that of subindex
listed in the Tab. V, which keeps constant in the same dataset,
no matter how many keywords are contained in a query. While
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Published by, www.ijert.org
ICESMART-2015 Conference Proceedings
Volume 3, Issue 19
Special Issue - 2015
8
the computation and communication cost in the query
procedure is linear with the number of query keywords in
other multiple-keyword search schemes [14], [16], our
proposed schemes enjoy the constant overhead in the query
which makes it more practical in the cloud paradigm.
VI. RELATED WORK
Single Keyword Searchable Encryption Traditional single
keyword searchable encryption schemes [5]–[13], [22] usually
build an encrypted searchable index such that its content is
hidden to the server unless it is given appropriate trapdoors
generated via secret key(s) [2]. It is first studied by Song et al.
[5] in the symmetric key setting, and improvements and
advanced security definitions are given in Goh [6], Chang et
al. [7] and Curtmola et al. [8]. Our early work [22] solves
secure ranked keyword search which utilizes keyword
frequency to rank results instead of returning undifferentiated
results. However, it only supports single keyword search. In
the public key setting, Boneh et al. [9] present the first
searchable encryption construction, where anyone with public
key can write to the data stored on server but only authorized
users with private key can search. Public key solutions are
usually very computationally expensive however.
Furthermore, the keyword privacy could not be protected in
the public key setting since server could encrypt any keyword
with public key and then use the received trapdoor to evaluate
this ciphertext.
Boolean Keyword Searchable Encryption To enrich search
functionalities, conjunctive keyword search [14]–[18] over
encrypted data have been proposed. These schemes incur large
overhead caused by their fundamental primitives, such as
computation cost by bilinear map, e.g. [16], or communication
cost by secret sharing, e.g. [15]. As a more general search
approach, predicate encryption schemes [19]–[21] are recently
proposed to support both conjunctive and disjunctive search.
Conjunctive keyword search returns “all-or-nothing”, which
means it only returns those documents in which all the
keywords specified by the search query appear; disjunctive
keyword search returns undifferentiated results, which means
it returns every document that contains a subset of the specific
keywords, even only one keyword of interest. In short, none of
existing Boolean keyword searchable encryption schemes
support multiple keywords ranked search over encrypted cloud
data while preserving privacy as we propose to explore in this
paper. Note that, inner product queries in predicate encryption
only predicates whether two vectors are orthogonal or not, i.e.,
the inner product value is concealed except when it equals
zero. Without providing the capability to compare concealed
inner products, predicate encryption is not qualified for
performing ranked search. Furthermore, most of these
schemes are built upon the expensive evaluation of pairing
operations on elliptic curves. Such inefficiency disadvantage
also limits their practical performance when deployed in
cloud. On a different front, the research on top-k retrieval [24]
in database community is also loosely connected to our
problem.
VII. CONCLUSION
In this paper, for the first time we define and solve the
problem of multi-keyword ranked search over encrypted cloud
data, and establish a variety of privacy requirements. Among
various multi-keyword semantics, we choose the efficient
principle of “coordinate matching”, i.e., as many matches as
possible, to effectively capture similarity between query
keywords and outsourced documents, and use “inner product
similarity” to quantitatively formalize such a principle for
similarity measurement. For meeting the challenge of
supporting multi-keyword semantic without privacy breaches,
we first propose a basic MRSE scheme using secure inner
product computation, and significantly improve it to achieve
privacy requirements in two levels of threat models. Thorough
analysis investigating privacy and efficiency guarantees of
proposed schemes is given, and experiments on the real-world
dataset show our proposed schemes introduce low overhead on
both computation and communication. As our future work, we
will explore supporting other multi-keyword semantics ( e.g.,
weighted query) over encrypted data, integrity check of rank
order in search result and privacy guarantees in more stronger
threat model.
REFERENCES
[1] L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, “A
break in the clouds: towards a cloud definition,” ACM SIGCOMM Comput. Commun. Rev., vol. 39, no. 1, pp. 50–55, 2009.
[2] S. Kamara and K. Lauter, “Cryptographic cloud storage,” in RLCPS,
January 2010, LNCS. Springer, Heidelberg. [3] A. Singhal, “Modern information retrieval: A brief overview,” IEEE
Data Engineering Bulletin, vol. 24, no. 4, pp. 35–43, 2001. [4] I. H. Witten, A. Moffat, and T. C. Bell, “Managing gigabytes:
Compressing and indexing documents and images,” Morgan Kaufmann
Publishing, San Francisco, May 1999. [5] D. Song, D. Wagner, and A. Perrig, “Practical techniques for searches
on encrypted data,” in Proc. of S&P, 2000. [6] E.-J. Goh, “Secure indexes,” Cryptology ePrint Archive, 2003, http://
eprint.iacr.org/2003/216. [7] Y.-C. Chang and M. Mitzenmacher, “Privacy preserving keyword
searches on remote encrypted data,” in Proc. of ACNS, 2005. [8] R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, “Searchable
symmetric encryption: improved definitions and efficient constructions,”
in Proc. of ACM CCS, 2006. [9] D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, “Public key
encryption with keyword search,” in Proc. of EUROCRYPT, 2004. [10] M. Bellare, A. Boldyreva, and A. ONeill, “Deterministic and efficiently
searchable encryption,” in Proc. of CRYPTO, 2007. [11] M. Abdalla, M. Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J.
Malone-Lee, G. Neven, P. Paillier, and H. Shi, “Searchable encryption
revisited: Consistency properties, relation to anonymous ibe, and
extensions,” J. Cryptol., vol. 21, no. 3, pp. 350–391, 2008. [12] J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “Fuzzy keyword
search over encrypted data in cloud computing,” in Proc. of IEEE
INFOCOM’10 Mini-Conference, San Diego, CA, USA, March 2010. [13] D. Boneh, E. Kushilevitz, R. Ostrovsky, and W. E. S. III, “Public key
encryption that allows pir queries,” in Proc. of CRYPTO, 2007. [14] P. Golle, J. Staddon, and B. Waters, “Secure conjunctive keyword
search over encrypted data,” in Proc. of ACNS, 2004, pp. 31–45. [15] L. Ballard, S. Kamara, and F. Monrose, “Achieving efficient conjunctive
keyword searches over encrypted data,” in Proc. of ICICS, 2005. [16] D. Boneh and B. Waters, “Conjunctive, subset, and range queries on
encrypted data,” in Proc. of TCC, 2007, pp. 535–554. [17] R. Brinkman, “Searching in encrypted data,” in University of Twente,
PhD thesis, 2007. [18] Y. Hwang and P. Lee, “Public key encryption with conjunctive keyword
search and its extension to a multi-user system,” in Pairing, 2007.
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Published by, www.ijert.org
ICESMART-2015 Conference Proceedings
Volume 3, Issue 19
Special Issue - 2015
9
[19] J. Katz, A. Sahai, and B. Waters, “Predicate encryption supporting
disjunctions, polynomial equations, and inner products,” in Proc. of
EUROCRYPT, 2008. [20] A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, “Fully
secure functional encryption: Attribute-based encryption and
(hierarchical) inner product encryption,” in Proc. of EUROCRYPT, 2010.
[21] E. Shen, E. Shi, and B. Waters, “Predicate privacy in encryption
systems,” in Proc. of TCC, 2009. [22] C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, “Secure ranked keyword
search over encrypted cloud data,” in Proc. of ICDCS’10, 2010. [23] S. Zerr, E. Demidova, D. Olmedilla, W. Nejdl, M. Winslett, and S.
Mitra, “Zerber: r-confidential indexing for distributed documents,” in
Proc. of EDBT, 2008, pp. 287–298. [24] S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski, “Zerber+r: Top-k
retrieval from a confidential index,” in Proc. of EDBT, 2009. [25] Y. Ishai, E. Kushilevitz, R. Ostrovsky, and A. Sahai, “Cryptography
from anonymity,” in Proc. of FOCS, 2006, pp. 239–248. [26] W. K. Wong, D. W. Cheung, B. Kao, and N. Mamoulis, “Secure knn
computation on encrypted databases,” in Proc. of SIGMOD, 2009. [27] W. W. Cohen, “Enron email dataset,” http://www.cs.cmu.edu/∼enron/.
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Published by, www.ijert.org
ICESMART-2015 Conference Proceedings
Volume 3, Issue 19
Special Issue - 2015
10